Chapter 2 Understanding Identity and Access Management Flashcards
___________ occurs when users claim (or profess) their identity with identifiers such as usernames or email addresses.
Identification
Users then prove their identity with _________, such as with a password.
Authentication
True or False : You can’t have any type of access control if you can’t identify a user.
True
True or False : Authentication, authorization, and accounting (AAA) work together with identification to provide a comprehensive access management system.
True
Users are granted __________ to access resources based on their proven identity.
Authorization
___________ methods track user activity and record the activity in logs.
Accounting
An _____ ____ allows security professionals to re-create the events that preceded a security incident.
Audit trail
True or False : A use case of supporting authentication may require administrators to implement one factor of authentication for basic authentication, two factors for more secure authentication, or more factors for higher security.
True
List factors for authentication
- Something you know - PIN, password
- Something you have - CAC, Smart card
- Something you are - Biometric - fingerprint, retina, face
- Something you are such as you location
- Something you do - pattern swipe, gestures
The ________ __ _____ authentication factor typically refers to a shared secret, such as a password or even a PIN.
Something you know
What is the least secure form of authentication?
Something you know
True or False :
A strong password is of sufficient length, doesn’t include words found in a dictionary or any part of a user’s name, and combines at least three of the four following character types:
• Uppercase characters (26 letters A–Z)
• Lowercase characters (26 letters a–z)
• Numbers (10 numbers 0–9)
• Special characters (32 printable characters, such as !, $, and *)
True
What does MS recommend for minimum password length as of 2016?
14 characters
True or False : The combination of different characters in a password makes up the key space, and you can calculate the key space with the following formula: C^N (CN). C is the number of possible characters used, and N is the length of the password
True
True or False : An attacker can crack a 10-character password using only lowercase characters (141 trillion possibilities)in less than two hours.
True
Why do security experts say that too complex passwords are less secure?
Because it is more difficult to remember and users will likely write it down or store in an insecure file.
True or False : Complex passwords use a mix of character types. Strong passwords use a mix of character types and have a minimum password length of at least 14 characters
True
True or False : It’s not important for an organization to provide adequate training to users on password security.
(Page 172).
False
It is important
True or False : Users should change their passwords regularly, such as every 45 or 90 days.
True
True or False : Before resetting passwords for users, it’s important to verify the user’s identity. When resetting passwords manually, it’s best to create a temporary password that expires upon first use.
True
A _______ _______ system remembers past passwords and prevents users from reusing passwords
Password history
True or False : It’s common for password policy settings to remember the last 24 passwords and prevent users from reusing these until they’ve used 24 new passwords
True
_____ ______ allows an administrator to configure a setting once in a ______ ______ ______ and apply this setting to many users and computers within the domain.
Group Policy, Group Policy Object (GPO)
True or False : Group Policy is implemented on a domain controller within a domain. Administrators use it to create password policies, implement security settings, configure host-based firewalls, and much more
True
A common group of settings that administrators configure in Group Policy is the _______ Policy settings
Password
List some of the elements of password policies
- Minimum password age - to prevent users from reusing a previous password
- Maximum password age - to trigger expiration
- Minimum password length - to promote complexity
- Password complexity requirements - to promote complexity
True or False : Accounts will typically have lockout policies preventing users from guessing the password
True
List two key phrases associated with lockout policies
- Account lockout threshold - number of attempts before locking account
- Account lockout duration - length of time before account is unlocked
A basic security practice is to change _______ settings before putting a system into use.
Default
True or False : Some administrators create a dummy account named administrator which has no permissions.
True
If an attempt is made with this account the system will lock the account out and alert administrators
The _______ ___ _____ authentication factor refers to something you can physically hold.
Something you have
_____ ______ are credit card-sized cards that have an embedded microchip and a certificate. Users insert them into a reader, similar to how someone would insert a credit card into a credit card reader.
Smart cards
List the requirements for a smart card
- Embedded certificate - cert holds a user’s private key and matched with a public key (available to others for use). Private key is used each time the user logs on
- Public Key Infrastructure (PKI) - supports issuing and managing certs
A _____ ______ _____ is a specialized type of smart card used by the U.S. Department of Defense.
Common Access Card (CAC)
True or False : A CAC card includes a photo of the user and can be used as a form of identification
True
A _______ _____ ________ card is a specialized type of smart card used by U.S. federal agencies. It also includes photo identification and provides confidentiality, integrity, authentication, and non-repudiation for the users, just as a CAC does
Personal Identity Verification (PIV)
True or False : Smart cards are often used with dual-factor authentication where users have something (the smart card) and know something (such as a password or PIN). Smart cards include embedded certificates used with digital signatures and encryption. CACs and PIVs are specialized smart cards that include photo identification. They are used to gain access into secure locations and to log on to computer systems.
True
A ______ or ___ __ is an electronic device about the size of a remote key for a car
token or key fob (sometimes simply called a fob)
True or False : A token includes a liquid crystal display (LCD) that displays a number, and this number changes periodically, such as every 60 seconds.
True
The _____ is synced with a server that knows what the number is at any moment.
Token
_______ ______ ___ ____ ______ is an open standard used for creating one-time passwords, similar to those used in tokens or key fobs.
HMAC-based One-Time Password (HOTP)
True or False : A password created with HOTP remains valid until it’s used.
True
A ____ _____ ___ ____ _______ is similar to HOTP, but it uses a timestamp instead of a counter.
Time-based One-Time Password (TOTP)
True or False : One significant benefit of HOTP and TOTP is price. Hardware tokens that use these open source standards are significantly less expensive than tokens that use proprietary algorithms
True
TOTP expires after __ seconds
30
The ________ ___ ___ authentication factor uses biometrics for authentication
Something you are
True or False : Biometric methods are the strongest form of authentication because they are the most difficult for an attacker to falsify.
True
________ use a physical characteristic, such as a fingerprint, for authentication
Biometrics
List some types of biometrics
- Fingerprint scanner
- Retina scanner
- Iris scanner
- Voice recognition
- Facial recognition
True or False : A drawback with facial recognition is that it is sometimes negatively affected by changes in lighting.
True
List two biometric false readings
- False acceptance
2. False rejection
The _____ ______ ____ identifies the percentage of times false acceptance occurs
False acceptance rate
The _____ _________ ____ identifies the percentage of times false rejections occur
False rejection rate
True or False : True acceptance is when the biometric system accurately determines a positive match
True
True or False : True rejection occurs when the biometric system accurately determines a non-match
True
By increasing the sensitivity for a biometric, it ________ the number of false matches and ________ the number of false rejections
Decreases, increases
Decreasing the sensitivity for a biometric ______ the false matches and ________ the false rejections.
Increases,decreases
True or False : By plotting the FAR and FRR rates using different sensitivities, you can determine the effectiveness of a biometric system
True
The ________ ____ ____ is the point where the FAR crosses over with the FRR
Crossover error rate (CER)
True or False : A lower CER indicates that the biometric system is more accurate
True
The _______ ___ ___ authentication factor identifies a user’s location
Somewhere you are